New York, NY, October 30, 2014 -- According to Reuters, hackers thought to be working for the Russian government breached the unclassified White House computer networks in recent weeks resulting in temporary disruptions to some services while cybersecurity teams worked to contain the intrusion. White House officials said that the intruders did not damage any of the systems and that, to date, there is no evidence the classified network was hacked.
Is classified information the United States government manages adequately protected from cyber terrorism? This topic will be discussed at Golden Networking's Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com), forum that will provide a platform for information security authorities and innovative service providers to distil their latest thinking for hundreds of senior executives focused on protecting today’s enterprises and federal agencies. Cyber security experts will discuss topics such as protecting individuals and companies against cyber-attacks, biometrics as the future of security, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.
White House officials were not commenting on who was behind the intrusion or how much data, if any, was taken. Recent reports by security firms have identified cyber-espionage campaigns by Russian hackers thought to be working for the government. The FBI, Secret Service and National Security Agency have been all involved in the recent investigations. Targets have included NATO, the Ukrainian government and U.S. defense contractors. Russia is regarded by U.S. officials as being in the top tier of states with cyber-capabilities.
The Russian intelligence service was believed to have been behind a breach of the U.S. military’s classified networks, which was discovered in 2008. The operation to contain the intrusion and clean up the computers, called Buckshot Yankee, took months to complete.
Cyber Security World Conference 2014 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Topics that will discussed include:
Topics that Cyber Security World Conference 2014 will discuss include:
-Cyber Security Megatrends Security Professionals can’t Ignore Today
-Designing and Managing Effective Information Security Programs
-Is Biometrics the Key to Personal and Corporate Security?
-How Hackers Really Operate to Obtain Financial Data
-Key Considerations about Security in the Internet of Things Age
-Strengthening the Security of Industry-wide Technology Infrastructure
-Cyber Security and its Role in the Overall Security of the United States
OPENING KEYNOTE SPEAKER: ROBERT GARDNER
Funding Partner, New World Technology Partners (NWTP)
Mr. Gardner has been a leader in cyber and critical infrastructure risk management technology and an incubator of technology enterprises since the mid-seventies. Mr. Gardner managed/participated in the launch of several early stage companies formed around those technologies, including August Systems, Verdix, Meiko Scientific, Cryptek, Phoenix Numeric and Probity Labs.
Mr. Gardner has prepared briefings and testimony for the U.S. House of Representatives and Senate caucuses on the technology impact on Financial (TARP) Infrastructure and The “First Three Hours” Emergency Response Methods.
CLOSING KEYNOTE SPEAKER: KENNETH BRANCIK
Author, "Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks"
Dr. Brancik is a leading Information Security consultant a proven strategic thought leader and visionary over the development and integration of innovative emerging Cyber and Cloud R&D technologies in support of achieving business strategies, mission information assurance (IA) and enterprise risk governance.
Dr. Brancik has over thirty years of progressive work experience and education for ensuring successful security engineering over IA activities involving software development activities, production applications and security over the enterprise architecture and the protection of mission critical data and information systems.within the financial services sector, the telecommunications and defense industries.
Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to [email protected]
New York, NY